General
-
Target
yes - Copy (2).jpg
-
Size
12KB
-
Sample
240221-p76gbafe9x
-
MD5
dfdce4908325a676a447b20a60196cba
-
SHA1
975a864d82127e0037096ce326d322020764a8d2
-
SHA256
516ff7ec447e79f48dd8116d58aedb63b92580a768b181a37e8f487599652ef0
-
SHA512
e68188ab94bc66cdb0047300a857c317a05b02d8b752ac42f364a24922379e452818358a9e02e5e946b8f7724dccb1991eb2f567508e4be1168647134c0ce0cf
-
SSDEEP
384:NNxTtsCNCcrioZ9AA0r4S/DTB/qdlFif7zo6J5HWeb/i:hKGrioZ9D0rd/DTob4j5W
Static task
static1
Behavioral task
behavioral1
Sample
yes - Copy (2).jpg
Resource
win10v2004-20240221-en
Malware Config
Targets
-
-
Target
yes - Copy (2).jpg
-
Size
12KB
-
MD5
dfdce4908325a676a447b20a60196cba
-
SHA1
975a864d82127e0037096ce326d322020764a8d2
-
SHA256
516ff7ec447e79f48dd8116d58aedb63b92580a768b181a37e8f487599652ef0
-
SHA512
e68188ab94bc66cdb0047300a857c317a05b02d8b752ac42f364a24922379e452818358a9e02e5e946b8f7724dccb1991eb2f567508e4be1168647134c0ce0cf
-
SSDEEP
384:NNxTtsCNCcrioZ9AA0r4S/DTB/qdlFif7zo6J5HWeb/i:hKGrioZ9D0rd/DTob4j5W
Score8/10-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-